Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three di...
We introduce a new adaptive genetic method for AVT generation, MCM-AVT-Learner. The MCM-AVTLearner imports the mutation and crossover matrices which makes effective use of the fi...
Hyunsung Jo, Yong-chan Na, Byonghwa Oh, Jihoon Yan...